메뉴 건너뛰기




Volumn 4, Issue 3, 2008, Pages 251-266

Behavioral detection of malware: From a survey towards an established taxonomy

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; DECISION SUPPORT SYSTEMS; PROGRAM INTERPRETERS; SURVEYS; TAXONOMIES;

EID: 48349134267     PISSN: 17729890     EISSN: 17729904     Source Type: Journal    
DOI: 10.1007/s11416-008-0086-0     Document Type: Article
Times cited : (172)

References (72)
  • 1
    • 0004246220 scopus 로고
    • Ph.D. thesis, University of South California
    • Cohen, F.: Computer viruses. Ph.D. thesis, University of South California (1986)
    • (1986) Computer Viruses
    • Cohen, F.1
  • 2
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • 1
    • Cohen F.B. (1987). Computer viruses: Theory and experiments. Comput. Secur. 6(1): 22-35
    • (1987) Comput. Secur. , vol.6 , pp. 22-35
    • Cohen, F.B.1
  • 4
    • 33947608017 scopus 로고    scopus 로고
    • Intrusion detection and virology: An analysis of differences, similarities and complementariness
    • Bonfante, G., Marion, J.-Y. (eds.) WTCV'06 Special Issue
    • Mé, L., Morin, B.: Intrusion detection and virology: an analysis of differences, similarities and complementariness. In: Bonfante, G., Marion, J.-Y. (eds.) J. Comput. Virol., vol. 3, no. 1, WTCV'06 Special Issue, pp. 39-49 (2007)
    • (2007) J. Comput. Virol. , vol.3 , Issue.1 , pp. 39-49
    • Mé, L.1    Morin, B.2
  • 6
    • 0023294428 scopus 로고
    • An intrusion-detection model
    • Denning, D.: An intrusion-detection model. IEEE Trans. Softw. Eng., vol. SE-13 (1987)
    • (1987) IEEE Trans. Softw. Eng. , vol.SE-13
    • Denning, D.1
  • 10
    • 48349143061 scopus 로고    scopus 로고
    • Fortinet observatory. http://www.fortinet.com/FortiGuardCenter/
  • 11
    • 84865434964 scopus 로고    scopus 로고
    • Commtouch Software Ltd
    • Malware outbreak trend report: Storm-worm, Commtouch Software Ltd (2007). http://www.commtouch.com/downloads/Storm-Worm_MOTR.pdf
    • (2007) Malware Outbreak Trend Report: Storm-worm
  • 12
    • 33748978409 scopus 로고    scopus 로고
    • Malware pattern scanning schemes secure against black-box analysis
    • Broucek, V., Turner, P. (eds.) , EICAR 2006 Special Issue
    • Filiol, E.: Malware pattern scanning schemes secure against black-box analysis. In: Broucek, V., Turner, P. (eds.) J. Comput. Virol., vol. 2, no. 1, EICAR 2006 Special Issue, pp. 35-50 (2006)
    • (2006) J. Comput. Virol. , vol.2 , Issue.1 , pp. 35-50
    • Filiol, E.1
  • 13
    • 33751191077 scopus 로고    scopus 로고
    • Springer Heidelberg, IRIS Collection ISBN:2-287-33887-8
    • Filiol, E. (2007). Techniques Virales Avancées. Springer, Heidelberg, IRIS Collection. ISBN:2-287-33887-8
    • (2007) Techniques Virales Avancées
    • Filiol, E.1
  • 15
    • 0037269111 scopus 로고    scopus 로고
    • Reliable identification of boundedlength viruses is np-complete
    • Spinellis D. (2003). Reliable identification of boundedlength viruses is np-complete. IEEE Trans. Inf. Theory 49: 280-284
    • (2003) IEEE Trans. Inf. Theory , vol.49 , pp. 280-284
    • Spinellis, D.1
  • 16
    • 35348995283 scopus 로고    scopus 로고
    • Metamorphism, formal grammars and undecidable code mutation
    • Published in the Int. J. Comput. Sci.
    • Filiol, E.: Metamorphism, formal grammars and undecidable code mutation. In: Proceedings of the International Conference on Computational Intelligence (ICCI), Published in the Int. J. Comput. Sci., vol. 2, issue 1, pp. 70-75 (2007)
    • (2007) Proceedings of the International Conference on Computational Intelligence (ICCI) , vol.2 , Issue.1 , pp. 70-75
    • Filiol, E.1
  • 18
    • 33748929179 scopus 로고    scopus 로고
    • How to assess the effectiveness of your anti-virus?
    • Broucek, V. (ed.) , EICAR 2006 Special Issue
    • Josse, S.: How to assess the effectiveness of your anti-virus? In: Broucek, V. (ed.) J. Comput. Virol., vol. 2, no. 1, EICAR 2006 Special Issue, pp. 51-65 (2006)
    • (2006) J. Comput. Virol. , vol.2 , Issue.1 , pp. 51-65
    • Josse, S.1
  • 19
    • 33947585353 scopus 로고    scopus 로고
    • Evaluation methodology and theoretical model for antiviral behavioural detection strategies
    • Bonfante, G., Marion, J.-Y. (eds.) WTCV'06 Special Issue
    • Filiol, E., Jacob, G., Liard, M.L.: Evaluation methodology and theoretical model for antiviral behavioural detection strategies. In: Bonfante, G., Marion, J.-Y. (eds.) J. Comput. Virol., vol. 3, no. 1, WTCV'06 Special Issue, pp. 23-37 (2007)
    • (2007) J. Comput. Virol. , vol.3 , Issue.1 , pp. 23-37
    • Filiol, E.1    Jacob, G.2    Liard, M.L.3
  • 25
    • 48349093693 scopus 로고    scopus 로고
    • Cwsandbox. Sunbelt Software. http://www.cwsandbox.org
    • Sunbelt Software
  • 26
    • 33748932391 scopus 로고    scopus 로고
    • Dynamic analysis of malicious code
    • Broucek, V., Turner, P., (eds.) EICAR 2006 Special Issue
    • Bayer, U., Moser, A., Kruegel, C., Kirda, E.: Dynamic analysis of malicious code. In: Broucek, V., Turner, P., (eds.) J. Comput. Virol., vol. 2, no. 1, EICAR 2006 Special Issue, pp. 67-77 (2006)
    • (2006) J. Comput. Virol. , vol.2 , Issue.1 , pp. 67-77
    • Bayer, U.1    Moser, A.2    Kruegel, C.3    Kirda, E.4
  • 30
    • 48349127005 scopus 로고    scopus 로고
    • Behavior blocking: The next step in anti-virus protection
    • Nachenberg, C.: Behavior blocking: The next step in anti-virus protection, SecurityFocus, 2002. http://www.securityfocus.com/infocus/1557
    • (2002) SecurityFocus
    • Nachenberg, C.1
  • 35
    • 48349132266 scopus 로고    scopus 로고
    • Understanding heuristics: Symantec bloodhound technology
    • Tech. rep.
    • Understanding heuristics: Symantec bloodhound technology. Tech. rep., Symantec White Paper Series, vol. XXXIV (1997)
    • (1997) Symantec White Paper Series , vol.34
  • 44
    • 34547457465 scopus 로고    scopus 로고
    • Secure and advanced unpacking using computer emulation, extended version from the avar conference
    • 3
    • Josse S. (2007). Secure and advanced unpacking using computer emulation, extended version from the avar conference. J. Comput. Virol. 3(3): 221-236
    • (2007) J. Comput. Virol. , vol.3 , pp. 221-236
    • Josse, S.1
  • 52
    • 33751196771 scopus 로고    scopus 로고
    • Detection of metamorphic computer viruses using algebraic specification
    • 3
    • Webster M. and Malcolm G. (2006). Detection of metamorphic computer viruses using algebraic specification. J. Comput. Virol. 2(3): 149-161
    • (2006) J. Comput. Virol. , vol.2 , pp. 149-161
    • Webster, M.1    Malcolm, G.2
  • 54
    • 84946414079 scopus 로고    scopus 로고
    • Static verification of worm and virus behavior in binary executables using model checking
    • Singh, P., Lakhotia, A.: Static verification of worm and virus behavior in binary executables using model checking. In: Proceedings of the IEEE Information Assurance Workshop, pp. 298-300 (2003)
    • (2003) Proceedings of the IEEE Information Assurance Workshop , pp. 298-300
    • Singh, P.1    Lakhotia, A.2
  • 56
    • 9444298254 scopus 로고    scopus 로고
    • The complexity of temporal logic model checking
    • Schnoebelen P. (2003). The complexity of temporal logic model checking. Adv. Modal Logic 4: 393-436
    • (2003) Adv. Modal Logic , vol.4 , pp. 393-436
    • Schnoebelen, P.1
  • 66
    • 85028593375 scopus 로고    scopus 로고
    • Avg anti-virus. Grisoft. http://www.grisoft.com/doc/39/lng/fr/tpl/tpl01
    • Avg Anti-virus
  • 67
    • 48349118762 scopus 로고    scopus 로고
    • Viguard. Softed. http://www.viguard.com/ detail_163_logiciel_antivirus_viguard-platinium#
    • Softed
  • 71
    • 48349129326 scopus 로고    scopus 로고
    • Truprevent. Panda Software. http://www.pandasoftware.com/products/ truprevent_tec.htm?sitepanda=particulares
    • Truprevent
  • 72
    • 48349113256 scopus 로고    scopus 로고
    • Virus keeper. AxBa. http://www.viruskeeper.com/fr/faq.htm
    • AxBa


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.